Course details

Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk

Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

In this 14-video course, discover how identifying IT asset risks and applying appropriate data privacy standards helps keep sensitive data from unauthorized entities, while preparing for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered course include: how the CIA triad (confidentiality, integrity, and availability) enhances IT security; understanding examples of personally identifiable information (PII) and protected health information (PHI); how General Data Protection Regulation (GDPR) assures data privacy; and how to align data protection policies with GDPR. Then learn how Payment Card Industry Data Security Standard (PCI DSS) protects cardholder information; how to identify network devices with insufficient antimalware protection with the free Spiceworks tool; and how Hypertext Transfer Protocol Secure Health Insurance Portability and Accountability Act (HIPAA) protects sensitive medical information. Next, learn how Federal Risk and Authorization Management Program (FedRAMP) standards secure US Government information systems; how to determine the annualized loss expectancy (ALE) value with an online ALE calculator; and how to scan a network by using Network Mapper (Nmap) to determine which devices are present.  Finally, map IT solutions to data privacy requirements.



Expected Duration (hours)
0.8

Lesson Objectives

Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk

  • Course Overview
  • define how the CIA triad enhances IT security
  • recognize examples of Personally Identifiable Information
  • recognize examples of Protected Health Information
  • describe how GDPR assures data privacy
  • align data protection policies with GDPR
  • describe how PCI DSS protects cardholder information
  • identify network devices with insufficient antimalware protection using the free Spiceworks tool
  • describe how HIPAA protects sensitive medical information
  • describe how FedRAMP standards are used to secure U.S. government information systems
  • recognize the importance of identifying assets that have the most value to a specific organization
  • determine the ALE value using an online ALE calculator
  • scan a network using Nmap to determine which devices are present
  • map IT solutions to data privacy requirements
  • Course Number:
    it_spcisa19_03_enus

    Expertise Level
    Expert